............ Have a nice day............

Wednesday, 28 May 2014

Security Threats To Grow Sever In Next Two Years


Internet has become an indispensable part of our business as well as personal lives and cyber threats are looming large to sabotage it. To counter these cyber attacks,, every year a nonprofit association, International Security Forum (ISF), tries to assess the security and risk management issues to give out a report on the biggest possible security threats in the next two years. Read on to know 7 such threats as compiled by the CIO.


 # Mobile apps become the main route for compromise: Mobile phones being a major disrupter in the tech industry these days, lacks security around the apps. This makes apps a prime target for the hackers to gain access into the user systems. It. The Chief information security officer should prepare the organization for the non avoidable situations by making sure that the ‘in house’ made apps follow the required testing procedures with the recognized systems. They should also incorporate the user devices into existing standards for accessing management and begin educating the people of BYOD risks.  





# Encryption failures: Encryption is the basic approach towards securing the internet communications. With the increasing user growth online and flaws in the software, encrypted files or servers are no longer believed to be secure. Encryption is not the ultimate security method hence enterprises should identify the sensitive data and opt for other suitable security solutions.


 #Skills gap becomes a chasm: With the cyber attacks increasing, security personals are in demand like never before.. However there is a considerable lag when it comes to the skilled information security professionals keeping up pace with the latest hacking skill sets followed by cyber criminals. Hence there is increasing need to train  people on these skills by enabling external coaching activities and start mentoring programs.


# Information security fails to work with new generations: The newer generations have a completely different approach towards the security and privacy norms than the outdated traditional ones. So, the understanding of how the newer generation  work and then adapting to them becomes important. The enterprises should change the existing procedures to fit the current generation methods and encourage the new security cultures.



# Service providers become a key vulnerability: The service providers are the key vulnerabilities in the supply chains which the cyber criminals can exploit and target to strike the organizations indirectly. The problem would be solved by partnering up with the service providers and understanding the legal jurisdictions governing the organization’s information.


A balkanized internet complicates business: Governments may exercise control over the free and open nature of the internet to counter cyber attacks. However it may also jeopardize the organization’s processes that involve using internet.. To overcome this, they have to start creating partnerships for information sharing and engage in multi stakeholder governance processes to share intelligence.


Nation-State Backed Espionage Goes Mainstream: All the government espionage activities were mostly a secret until recently it was all revealed by the Whistleblower Edward Snowden. These series of espionage details which have been made public have exposed the organization’s actions and is most likely to be followed by other’s too. So, the ISF suggests organizations to respond by participating in the threat intelligence sharing forums and to build relationships within the country and across all the industry sectors with ensuring knowledge about security and awareness across the organization.


No comments:

Post a Comment